CN107222284A - A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback - Google Patents

A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback Download PDF

Info

Publication number
CN107222284A
CN107222284A CN201710625711.1A CN201710625711A CN107222284A CN 107222284 A CN107222284 A CN 107222284A CN 201710625711 A CN201710625711 A CN 201710625711A CN 107222284 A CN107222284 A CN 107222284A
Authority
CN
China
Prior art keywords
data packets
raw data
legitimate receipt
receipt end
bob
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710625711.1A
Other languages
Chinese (zh)
Other versions
CN107222284B (en
Inventor
余川
孙黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Ruiyuan Wutong Intelligent Technology Co ltd
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201710625711.1A priority Critical patent/CN107222284B/en
Publication of CN107222284A publication Critical patent/CN107222284A/en
Application granted granted Critical
Publication of CN107222284B publication Critical patent/CN107222284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/06Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The invention discloses a kind of anti-eavesdropping transmission method of the fountain coding in Internet of Things based on channel feedback, comprise the following steps:In k-th of time slot, when legitimate receipt end Bob is properly received the coding bag of current time slots transmission, then then the raw data packets for selecting a legitimate receipt end Bob not decode are encoded, then the coding bag that the result of coding is sent as next time slot;Otherwise, then coding bag of the coding bag sent current time slots as next time slot;3) judge whether the raw data packets set U that legitimate receipt end Bob is not decoded is empty set, when the raw data packets set U that legitimate receipt end Bob is not decoded is not empty set, then go to step 2), when the raw data packets set U that legitimate receipt end Bob is not decoded is empty set, then legitimate receipt end Bob has been received by all raw data packets, legitimate receipt end Bob recovers source file according to all raw data packets are received, and the transmission method anti-eavesdropping can preferably, and security is higher.

Description

A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
Technical field
The invention belongs to wireless communication technology field, it is related to the fountain coding based on channel feedback in a kind of Internet of Things anti-surreptitiously Listen transmission method.
Background technology
In the past few years, developing rapidly and its extensive use with wireless communication technology, wireless network secure problem also by Increasing concern is arrived.
At present, the main stream approach of traditional transmission that ensures safety is realized by encrypting, still, following numerous wireless Business is ever-changing to the demand of safe class, and encryption method is also difficult to meet its demand.Compared with conventional encryption technique, physics The basic thought of layer safe practice is to utilize wireless communication technology by various declines, noise and the disturbing factor in wireless channel It is changed into the instrument of confrontation eavesdropping, so as to realize the safe transmission of physical layer.And from the perspective of application, also with easy reality Now, the advantages of easy care.
Fountain coding applies more by its peculiar advantage in terms of data broadcasting and storage, but seldom transports it Use on network security problem.It is feasible to be applied it to according to the fundamental characteristics of fountain codes in network security, as long as legal Reception user can be accumulated to required fountain codes packet prior to listener-in can just ensure the security of transmission.Therefore, pin The shortcoming and fountain coding for the method that ensured safety to tradition encode the feasible letter for the transmission that ensures safety in physical layer, and research is a kind of The specific anti-eavesdropping safe transmission method of fountain coding is significant.
The content of the invention
It is an object of the invention to the shortcoming for overcoming above-mentioned prior art, there is provided channel feedback is based in a kind of Internet of Things The anti-eavesdropping transmission method of fountain coding, the transmission method anti-eavesdropping can preferably, security is higher.
To reach the anti-eavesdropping transmission side of fountain coding in above-mentioned purpose, Internet of Things of the present invention based on channel feedback Method comprises the following steps:
1) set communication system and include an a transmitting terminal Alice and legitimate receipt end Bob, and the wireless communication of communication system Road uses rayleigh fading channel model, and source file is divided into K raw data packets by transmitting terminal Alice, and reselection is wherein any one Individual raw data packets are wrapped as first coding, then retransmit the first coding bag chosen;
2) in k-th of time slot, transmitting terminal Alice determines legal connect by the legitimate receipt end Bob 1bit information fed back to Whether receiving end Bob is properly received the coding bag of time slot transmission, when legitimate receipt end Bob is properly received current time slots transmission During coding bag, then the raw data packets that a legitimate receipt end Bob is not decoded are selected according to importance and channel quality, it is then right The raw data packets not decoded chosen are encoded, then the coding bag that the result of coding is sent as next time slot; When legitimate receipt end Bob is not properly received the coding bag of current time slots transmission, then transmitting terminal Alice is sent in next time slot Coding bag it is identical with the coding bag that current time slots are not properly received, meanwhile, transmitting terminal Alice is according to legitimate receipt end Bob What 1bit information architecture legitimate receipts end the Bob decoded raw data packets set D and legitimate receipt end Bob of feedback were not decoded Raw data packets set U;
3) judge whether the raw data packets set U that legitimate receipt end Bob is not decoded is empty set, as legitimate receipt end Bob When the raw data packets set U not decoded is not empty set, then step 2 is gone to), the original number not decoded as legitimate receipt end Bob During according to bag set U for empty set, then legitimate receipt end Bob has been received by all raw data packets, legitimate receipt end Bob according to Receive all raw data packets and recover source file, complete the anti-eavesdropping fountain codes construction based on channel feedback.
Step 2) in the raw data packets not decoded that choose are encoded, then using the result of coding as next What time slot was sent, which encodes the concrete operations wrapped, is:
When legitimate receipt end Bob receives transmitting terminal AliceThe coding bag t that time slot is sentiWhen, then transmitting terminal Alice The coding bag t sent in i+1 time slotsi+1For:
Wherein, B is the XOR result for all raw data packets that legitimate receipt end Bob is decoded, sx+1∈ U, sx+1 The initial data not decoded according to the legitimate receipt end Bob that importance and channel quality choose for transmitting terminal Alice Bag.
In the raw data packets set U that each time slot, transmitting terminal Alice are not decoded to legal receiving terminal Bob it is all not The raw data packets of decoding are according to important factor imxIt is ranked up from big to small, wherein, U={ u1, u2, uc..., uL, ucFor c The raw data packets that individual legitimate receipt end Bob is not decoded, when c is smaller, then ucIt is more important.
After the raw data packets set D decoded, legitimate receipt end Bob is received into raw data packets txWith not Receive raw data packets txThe absolute value sum of the image corresponding points pixel value recovered respectively is as raw data packets tx Important factor imx
The raw data packets that a legitimate receipt end Bob is not decoded are selected according to importance and channel quality, wherein, channel Quality is better, then corresponding raw data packets are more important, i.e., the probability that the raw data packets are selected is bigger.
When index c is bigger, then raw data packets ucThe probability being selected is bigger, wherein,
Wherein, L is the raw data packets number that legitimate receipt end Bob is not decoded, z0For default channel quality quality Separation, z is the Real-time Channel gain between transmitting terminal Alice and legitimate receipt end Bob, z=| hAB|2AndD is the distance between transmitting terminal Alice and legitimate receipt end Bob, and α is transmission The path loss between Alice and legitimate receipt end Bob is held, α is the constant more than 1.
The invention has the advantages that:
The anti-eavesdropping transmission method of fountain coding in Internet of Things of the present invention based on channel feedback in concrete operations, In k-th of time slot, whether transmitting terminal Alice determines legitimate receipt end Bob by the legitimate receipt end Bob 1bit information fed back to The coding bag of time slot transmission is properly received, when legitimate receipt end Bob is properly received the coding bag of current time slots transmission, then Then the raw data packets not decoded chosen are entered by the raw data packets that one legitimate receipt end Bob of selection is not decoded Row coding, then the coding bag that the result of coding is sent as next time slot, so as to effectively improve listener-in Eve error code Rate, anti-eavesdropping can be excellent, and the security of information transfer is higher, meanwhile, when legitimate receipt end Bob is not properly received current During the coding bag that gap is sent, then transmitting terminal Alice is not properly received in the coding bag that next time slot is sent with current time slots Coding bag is identical, so that legitimate receipt end Bob can recover complete source file.
Further, after legitimate receipt end Bob receives the coding bag of a upper time slot, in time slot transmitting terminal Alice The raw data packets XOR previous time slot legitimate receipt end that the coding bag that will be sent is not decoded by a legitimate receipt end Bob All raw data packets at Bob decodings are obtained, as long as therefore listener-in Eve has a coding bag not connect during eavesdropping Harvest work(, then it will be unable to decode the remaining raw data packets not decoded, so as to cause its eavesdropping failure.
Brief description of the drawings
Fig. 1 is system model figure of the present invention;
Fig. 2 carries the complexity comparison diagram of code construction method for existing method with the present invention;
Fig. 3 is existing method and the change curve of listener-in Eve intercept probabilities of the invention with raw data packets number K Figure;
Fig. 4 a are artwork;
Fig. 4 b are the image that legitimate receipt end Bob is recovered;
Fig. 4 c are the image that listener-in Eve is stolen.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings:
With reference to Fig. 1, the anti-eavesdropping transmission method of fountain coding in Internet of Things of the present invention based on channel feedback includes Following steps:
1) set communication system and include an a transmitting terminal Alice and legitimate receipt end Bob, and the wireless communication of communication system Road uses rayleigh fading channel model, and source file is divided into K raw data packets by transmitting terminal Alice, and reselection is wherein any one Individual raw data packets are wrapped as first coding, then retransmit the first coding bag chosen;
2) in k-th of time slot, transmitting terminal Alice determines legal connect by the legitimate receipt end Bob 1bit information fed back to Whether receiving end Bob is properly received the coding bag of time slot transmission, when legitimate receipt end Bob is properly received current time slots transmission During coding bag, then the raw data packets that a legitimate receipt end Bob is not decoded are selected according to importance and channel quality, it is then right The raw data packets not decoded chosen are encoded, then the coding bag that the result of coding is sent as next time slot; When legitimate receipt end Bob is not properly received the coding bag of current time slots transmission, then transmitting terminal Alice is sent in next time slot Coding bag it is identical with the coding bag that current time slots are not properly received, meanwhile, transmitting terminal Alice is according to legitimate receipt end Bob What 1bit information architecture legitimate receipts end the Bob decoded raw data packets set D and legitimate receipt end Bob of feedback were not decoded Raw data packets set U;
3) judge whether the raw data packets set U that legitimate receipt end Bob is not decoded is empty set, as legitimate receipt end Bob When the raw data packets set U not decoded is not empty set, then step 2 is gone to), the original number not decoded as legitimate receipt end Bob During according to bag set U for empty set, then legitimate receipt end Bob has been received by all raw data packets, legitimate receipt end Bob according to Receive all raw data packets and recover source file, complete the anti-eavesdropping fountain codes construction based on channel feedback.
Step 2) in the raw data packets not decoded that choose are encoded, then using the result of coding as next What time slot was sent, which encodes the concrete operations wrapped, is:
When legitimate receipt end Bob receives transmitting terminal AliceThe coding bag t that time slot is sentiWhen, then transmitting terminal Alice The coding bag t sent in i+1 time slotsi+1For:
Wherein, B is the XOR result for all raw data packets that legitimate receipt end Bob is decoded, sx+1∈ U, sx+1 The initial data not decoded according to the legitimate receipt end Bob that importance and channel quality choose for transmitting terminal Alice Bag.
In the raw data packets set U that each time slot, transmitting terminal Alice are not decoded to legal receiving terminal Bob it is all not The raw data packets of decoding are according to important factor imxIt is ranked up from big to small, wherein, U={ u1, u2, uc..., uL, ucFor c The raw data packets that individual legitimate receipt end Bob is not decoded, when c is smaller, then ucIt is more important.
After the raw data packets set D decoded, legitimate receipt end Bob is received into raw data packets txWith not Receive raw data packets txThe absolute value sum of the image corresponding points pixel value recovered respectively is as raw data packets tx Important factor imx
The raw data packets that a legitimate receipt end Bob is not decoded are selected according to importance and channel quality, wherein, channel Quality is better, then corresponding raw data packets are more important, i.e., the probability that the raw data packets are selected is bigger.
When index c is bigger, then raw data packets ucThe probability being selected is bigger, wherein,
Wherein, L is the raw data packets number that legitimate receipt end Bob is not decoded, z0For default channel quality quality Separation, z is the Real-time Channel gain between transmitting terminal Alice and legitimate receipt end Bob, z=| hAB|2AndD is the distance between transmitting terminal Alice and legitimate receipt end Bob, and α is transmission The path loss between Alice and legitimate receipt end Bob is held, α is the constant more than 1.
With reference to Fig. 2, Fig. 2 abscissa represents simulation times, and ordinate represents to emulate the time that corresponding number of times is run, by Fig. 2 is understood, in the case of simulated conditions identical, and the present invention has lower operation complexity, and more multiple than existing methods About 19% or so (at n=100 times, t1=100.384s, t2=81.253s) of miscellaneous degree lifting, its reason is that the present invention is being compiled Optimization during code construction to coding bag.
With reference to Fig. 3, from simulation result it can be found that the present invention is identical with the intercepting and capturing rate that currently existing scheme can reach, all It is the increase with K, nearly exponential damping law is presented in listener-in Eve intercept probability.When K is larger, listener-in Eve can reach To a low-down intercept probability.For example, Fig. 4 a, Fig. 4 b and Fig. 4 c are doing real image (220x220 gray-scale map) transmission K=(220x220)/10=4840 during emulation, now listener-in Eve can from intercepting and capturing coding bag in recover few original number According to bag.
It can be seen that from Fig. 4 a, Fig. 4 b and Fig. 4 c, can be realized and recovered without distortions at validated user using the present invention While going out original image, the image fault that listener-in Eve goes out from the data packet recovery intercepted is huge, so as to reach safe biography Defeated purpose.

Claims (6)

1. the anti-eavesdropping transmission method of fountain coding in a kind of Internet of Things based on channel feedback, it is characterised in that including following step Suddenly:
1) communication system is set to adopt comprising an a transmitting terminal Alice and legitimate receipt end Bob, and the wireless channel of communication system Rayleigh fading channel model is used, source file is divided into K raw data packets, reselection wherein any one original by transmitting terminal Alice Beginning packet is wrapped as first coding, then retransmits the first coding bag chosen;
2) in k-th of time slot, transmitting terminal Alice determines legitimate receipt end by the legitimate receipt end Bob 1bit information fed back to Whether Bob is properly received the coding bag of time slot transmission, when legitimate receipt end Bob is properly received the coding of current time slots transmission Bao Shi, then select the raw data packets that a legitimate receipt end Bob is not decoded, then to selection according to importance and channel quality The raw data packets not decoded out are encoded, then the coding bag that the result of coding is sent as next time slot;Work as conjunction When method receiving terminal Bob is not properly received the coding bag of current time slots transmission, then the volume that transmitting terminal Alice is sent in next time slot Code bag is identical with the coding bag that current time slots are not properly received, meanwhile, transmitting terminal Alice feeds back according to legitimate receipt end Bob 1bit information architecture legitimate receipts end Bob decoded raw data packets set D and legitimate receipt end Bob do not decode it is original Packet set U;
3) judge whether the raw data packets set U that legitimate receipt end Bob is not decoded is empty set, and Bob is not solved when legitimate receipt end When the raw data packets set U of code is not empty set, then step 2 is gone to), the raw data packets not decoded as legitimate receipt end Bob When set U is empty set, then legitimate receipt end Bob has been received by all raw data packets, and legitimate receipt end Bob is according to reception Source file is recovered to all raw data packets, the anti-eavesdropping fountain codes construction based on channel feedback is completed.
2. the anti-eavesdropping transmission method of fountain coding in Internet of Things according to claim 1 based on channel feedback, its feature Be, step 2) in the raw data packets not decoded that choose are encoded, then regard the result of coding as lower a period of time What gap was sent, which encodes the concrete operations wrapped, is:
When legitimate receipt end Bob receives the coding bag t that transmitting terminal Alice is sent in the i-th time slotiWhen, then transmitting terminal Alice is in i+1 The coding bag t that time slot is senti+1For:
<mrow> <msub> <mi>t</mi> <mrow> <mi>i</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mi>B</mi> <mo>&amp;CirclePlus;</mo> <msub> <mi>s</mi> <mrow> <mi>x</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </mrow>
Wherein, B is the XOR result for all raw data packets that legitimate receipt end Bob is decoded, sx+1∈ U, sx+1For hair The raw data packets that sending end Alice is not decoded according to the legitimate receipt end Bob that importance and channel quality choose.
3. the anti-eavesdropping transmission method of fountain coding in Internet of Things according to claim 1 based on channel feedback, its feature It is, it is all in the raw data packets set U that each time slot, transmitting terminal Alice are not decoded to legal receiving terminal Bob not decode Raw data packets according to important factor imxIt is ranked up from big to small, wherein, U={ u1, u2, uc..., uL, ucFor c-th of conjunction The raw data packets that method receiving terminal Bob is not decoded, when c is smaller, then ucIt is more important.
4. the anti-eavesdropping transmission method of fountain coding in Internet of Things according to claim 3 based on channel feedback, its feature It is, after the raw data packets set D decoded, legitimate receipt end Bob is received into raw data packets txWith not receiving To raw data packets txThe absolute value sum of the image corresponding points pixel value recovered respectively is as raw data packets tx's Important factor imx
5. the anti-eavesdropping transmission method of fountain coding in Internet of Things according to claim 1 based on channel feedback, its feature It is, the raw data packets that a legitimate receipt end Bob is not decoded is selected according to importance and channel quality, wherein, channel matter Amount is better, then corresponding raw data packets are more important, i.e., the probability that the raw data packets are selected is bigger.
6. the anti-eavesdropping transmission method of fountain coding in Internet of Things according to claim 5 based on channel feedback, its feature It is, when index c is bigger, then raw data packets ucThe probability being selected is bigger, wherein,
Wherein, L is the raw data packets number that legitimate receipt end Bob is not decoded, z0For the boundary of default channel quality quality Point, z is the Real-time Channel gain between transmitting terminal Alice and legitimate receipt end Bob, z=| hAB|2Andσ2=d, d is the distance between transmitting terminal Alice and legitimate receipt end Bob, and α is transmitting terminal Path loss between Alice and legitimate receipt end Bob, α is the constant more than 1.
CN201710625711.1A 2017-07-27 2017-07-27 The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things Active CN107222284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710625711.1A CN107222284B (en) 2017-07-27 2017-07-27 The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710625711.1A CN107222284B (en) 2017-07-27 2017-07-27 The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things

Publications (2)

Publication Number Publication Date
CN107222284A true CN107222284A (en) 2017-09-29
CN107222284B CN107222284B (en) 2019-03-01

Family

ID=59954702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710625711.1A Active CN107222284B (en) 2017-07-27 2017-07-27 The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things

Country Status (1)

Country Link
CN (1) CN107222284B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes
CN108718225A (en) * 2018-08-25 2018-10-30 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method based on the interference of fountain codes key coded identification
CN109412750A (en) * 2018-09-19 2019-03-01 西安交通大学 Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
WO2011071472A1 (en) * 2009-12-09 2011-06-16 Thomson Licensing The application of fountain forward error correction codes in multi-link multi-path mobile networks
CN102833051A (en) * 2012-08-24 2012-12-19 北京理工大学 Fountain coding broadcast method based on feedback
CN103051424A (en) * 2013-01-07 2013-04-17 北京理工大学 Wireless transmission method for varied error protective fountain code
CN105141412A (en) * 2015-09-28 2015-12-09 西安交通大学 Fountain-coding-based method for ensuring multicast security transmission of multimedia
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN105790899A (en) * 2016-02-17 2016-07-20 北京理工大学 Fountain code based one-time feedback retransmission method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
WO2011071472A1 (en) * 2009-12-09 2011-06-16 Thomson Licensing The application of fountain forward error correction codes in multi-link multi-path mobile networks
CN102833051A (en) * 2012-08-24 2012-12-19 北京理工大学 Fountain coding broadcast method based on feedback
CN103051424A (en) * 2013-01-07 2013-04-17 北京理工大学 Wireless transmission method for varied error protective fountain code
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105141412A (en) * 2015-09-28 2015-12-09 西安交通大学 Fountain-coding-based method for ensuring multicast security transmission of multimedia
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN105790899A (en) * 2016-02-17 2016-07-20 北京理工大学 Fountain code based one-time feedback retransmission method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes
CN108718225A (en) * 2018-08-25 2018-10-30 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method based on the interference of fountain codes key coded identification
CN108718225B (en) * 2018-08-25 2021-03-23 中国人民解放军战略支援部队信息工程大学 Safe transmission method based on fountain code key coding symbol interference
CN109412750A (en) * 2018-09-19 2019-03-01 西安交通大学 Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication
CN109412750B (en) * 2018-09-19 2020-03-31 西安交通大学 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Also Published As

Publication number Publication date
CN107222284B (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN107360568B (en) Method for realizing symmetric encryption and guaranteeing wireless data secure transmission by utilizing fountain codes
CN105306168B (en) Method for guaranteeing secure transmission of wireless data based on fountain codes
CN110247732B (en) Fountain code coding design method based on mixed decoding in multicast environment
CN103347202B (en) EWF code coding method in a kind of wireless communication system
CN107222284A (en) A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN106936548A (en) A kind of mixed automatic retransmission request method and its device based on polarization code
WO2016015222A1 (en) Data encryption and transmission method and device
CN107148015A (en) A kind of continuous encryption safe transmission method of physical layer constructed based on polarization code
Du et al. Security enhancement for multicast over internet of things by dynamically constructed fountain codes
CN103888225A (en) Method for fountain codes under binary erasure channel
CN105553618A (en) Secure image transmission method based on fountain code and self-adaptive resource distribution
CN103716134B (en) The coding method of cumulative fountain codes is spent under feedback condition
CN101394299B (en) Method of network encoding and constellation overlapped encoding combination in mobile communication
CN105915318B (en) Pseudo relay selection safe transmission method based on spatial modulation
CN109361492B (en) High-performance decoding method combining physical layer network coding and polarization code
CN104284375A (en) Wireless network rate adaptive adjusting method
CN105141412B (en) Fountain-coding-based method for ensuring multicast security transmission of multimedia
CN109617655A (en) A kind of polarization code wireless data safe transmission method based on random scrambling code auxiliary
CN102065289B (en) Reliable video transmission method and device based on network coding
CN105554813B (en) It is a kind of in data transmission method of the wireless relay system based on Random Maps code
CN103812615A (en) Coding method for Luby transform code in distributed communication system, and relay communication method
CN106059713A (en) Method for constructing first-class wiretap channel through BSBC (Binary Symmetric Broadcast Channel)
Hamidi-Sepehr et al. Delay-sensitive communication over fading channels: Queueing behavior and code parameter selection
CN108631944B (en) Channel polarization safety coding method based on robust soliton distribution
CN106954242A (en) A kind of satellite distributed dynamic multi-path method for routing based on network code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220215

Address after: 719000 room 908, Gaoke building, Kaiyuan Avenue, high tech Industrial Park, Yulin City, Shaanxi Province

Patentee after: Shaanxi Ruiyuan Wutong Intelligent Technology Co.,Ltd.

Address before: Beilin District Xianning West Road 710049, Shaanxi city of Xi'an province No. 28

Patentee before: XI'AN JIAOTONG University